Research Article
A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems
Table 3
Comparisons of different protocols’ security.
| Attack methods | C-RAPA protocol | Chou protocol [26] | Liao protocol [27] | Xie protocol [32] |
| Counterfeiting attack | ✓ | × | × | ✓ | Replay attack | ✓ | ✓ | ✓ | ✓ | Replication attack | ✓ | ✓ | ✓ | ✓ | Forward privacy attack | ✓ | × | ✓ | ✓ | Desynchronization attack | ✓ | ✓ | ✓ | ✓ | Tag-tracking attack | ✓ | ✓ | × | × |
|
|